Login / Signup
Attack Techniques and Threat Identification for Vulnerabilities.
Constantin Adam
Muhammed Fatih Bulut
Daby Sow
Steven Ocepek
Chris Bedell
Lilian Ngweta
Published in:
CoRR (2022)
Keyphrases
</>
countermeasures
information security
attack graphs
attack graph
security vulnerabilities
attack scenarios
power analysis
cyber attacks
database
security risks
security issues
network security
data mining
automatic identification
security measures
case study
data corruption
website
buffer overflow